Skip to content

Commit de3dfdc

Browse files
committed
Added info about ciphers
1 parent af71462 commit de3dfdc

File tree

2 files changed

+36
-10
lines changed

2 files changed

+36
-10
lines changed

articles/iot-hub/iot-hub-tls-deprecating-1-0-and-1-1.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,15 +17,26 @@ To provide best-in-class encryption, IoT Hub is moving to Transport Layer Securi
1717

1818
IoT Hub will continue to support TLS 1.0/1.1 until further notice. However, we recommend that all customers migrate to TLS 1.2 as soon as possible.
1919

20-
## Supported ciphers
20+
## Deprecating TLS 1.1 ciphers
2121

22-
The timeline for availability of various ciphers used in TLS handshake is as follows:
22+
* `TLS_ECDHE_RSA_WITH_AES_256_CBC_SH`
23+
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`
24+
* `TLS_RSA_WITH_AES_256_CBC_SHA`
25+
* `TLS_RSA_WITH_AES_128_CBC_SHA`
26+
* `TLS_RSA_WITH_3DES_EDE_CBC_SHA`
2327

24-
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (currently supported)
25-
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (will be supported in second half of 2020)
26-
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (will be supported in second half of 2020)
27-
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (will be supported in second half of 2020)
28+
## Deprecating TLS 1.0 ciphers
2829

30+
* `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`
31+
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`
32+
* `TLS_RSA_WITH_AES_256_CBC_SHA`
33+
* `TLS_RSA_WITH_AES_128_CBC_SHA`
34+
* `TLS_RSA_WITH_3DES_EDE_CBC_SHA`
35+
36+
## TLS 1.2 ciphers
37+
38+
See [IoT Hub TLS 1.2 recommended ciphers](iot-hub-tls-support.md#recommended-ciphers).
39+
2940
## Customer feedback
3041

3142
While the TLS 1.2 enforcement is an industry-wide best-in-class encryption choice and will be enabled as planned, we still would like to hear from customers regarding their specific deployments and difficulties adopting TLS 1.2. For this purpose, you can send your comments to [[email protected]](mailto:[email protected]).

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ The created IoT Hub resource using this configuration will refuse device and ser
4949
> [!NOTE]
5050
> The `minTlsVersion` property is read-only and cannot be changed once your IoT Hub resource is created. It is therefore essential that you properly test and validate that *all* your IoT devices and services are compatible with TLS 1.2 and the [recommended ciphers](#recommended-ciphers) in advance.
5151
52-
### Supported regions
52+
## Supported regions
5353

5454
IoT Hubs that require the use of TLS 1.2 can be created in the following regions:
5555

@@ -62,7 +62,7 @@ IoT Hubs that require the use of TLS 1.2 can be created in the following regions
6262
> [!NOTE]
6363
> Upon failovers, the `minTlsVersion` property of your IoT Hub will remain effective in the geo-paired region post-failover.
6464
65-
### Recommended ciphers
65+
## Recommended ciphers
6666

6767
IoT Hubs that are configured to accept only TLS 1.2 will also enforce the use of the following recommended ciphers:
6868

@@ -71,7 +71,22 @@ IoT Hubs that are configured to accept only TLS 1.2 will also enforce the use of
7171
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`
7272
* `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384`
7373

74-
### Use TLS 1.2 in your IoT Hub SDKs
74+
For IoT Hubs not configured for TLS 1.2 enforcement, TLS 1.2 still works with the following ciphers:
75+
76+
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`
77+
* `TLS_DHE_RSA_WITH_AES_256_GCM_SHA384`
78+
* `TLS_DHE_RSA_WITH_AES_128_GCM_SHA256`
79+
* `TLS_RSA_WITH_AES_256_GCM_SHA384`
80+
* `TLS_RSA_WITH_AES_128_GCM_SHA256`
81+
* `TLS_RSA_WITH_AES_256_CBC_SHA256`
82+
* `TLS_RSA_WITH_AES_128_CBC_SHA256`
83+
* `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`
84+
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`
85+
* `TLS_RSA_WITH_AES_256_CBC_SHA`
86+
* `TLS_RSA_WITH_AES_128_CBC_SHA`
87+
* `TLS_RSA_WITH_3DES_EDE_CBC_SHA`
88+
89+
## Use TLS 1.2 in your IoT Hub SDKs
7590

7691
Use the links below to configure TLS 1.2 and allowed ciphers in IoT Hub client SDKs.
7792

@@ -84,6 +99,6 @@ Use the links below to configure TLS 1.2 and allowed ciphers in IoT Hub client S
8499
| NodeJS | Version 1.12.2 or newer | [Link](https://aka.ms/Tls_Node_SDK_IoT) |
85100

86101

87-
### Use TLS 1.2 in your IoT Edge setup
102+
## Use TLS 1.2 in your IoT Edge setup
88103

89104
IoT Edge devices can be configured to use TLS 1.2 when communicating with IoT Hub. For this purpose, use the [IoT Edge documentation page](https://github.com/Azure/iotedge/blob/master/edge-modules/edgehub-proxy/README.md).

0 commit comments

Comments
 (0)